SlideShare uma empresa Scribd logo
1 de 6
Baixar para ler offline
Information Security for Health Practitioners
12 ways to protect your clients’ information and yourself
A clinic can be fined up to $250,000 for each breach of privacy. Every employee
of the business can be fined up to $50,000 by the Privacy Commissioner. Patient
receives $10,000 for mental anguish and also is able to initiate a civil lawsuit
against the business and its employees-CHIPRB
2
Information security is one of the biggest challenges facing healthcare companies and practitioners.
With the ubiquity of technology, today’s healthcare practitioner uses at least one computer device (PDA,
mobile phone, laptop, notebook or netbook) in his/her daily routine. Most work with several devices
and programs, transferring information from one program to another, often with questionable security
provisions.
But alongside the solid productivity gains spawned by technology, are cyber predators who actively
engaged in stealing valuable information, using malware (including various forms of viruses, worms,
trojans) as the tool of choice. The consequences of becoming a victim can be devastating. In addition to
hefty fines mandated by PHIPA, a publicized breach of information can have severe costs for employees,
employers and consultants.
Don’t become the next victim. Prevention is the best practice, especially in small to mid-size companies
without dedicated technology and security support. Healthcare companies and practitioners would be
prudent to consider a review of their information security systems. Here are two inexpensive
suggestions you can start with:
I. Invest in a secure Case and Practice Management Software, with built-in encryption technology.
II. Implement a good security policy or security routine. Here are a few good policies and practices
you can start with immediately.
1. Use a current operating system
Keep your computer operating system up-to-date.
First, your operating system should be one that is currently supported by the
software vendor.
Windows 2000 software may be very good but is long discontinued by
Microsoft. Current Microsoft operating systems include XP, Vista, Windows 7
and Windows 8. Microsoft will no longer support its XP operating system after
April 8, 2014. You should plan to replace your XP operating systems with
Windows 7 or 8.
Second, keep your computer operating system up-to-date. Free updates
released by software vendors, close security loopholes, and keep you abreast
with technology, among other things. There is an automatic update setting that,
if turned on, allows your computer to download and update all critical updates
from Microsoft (which accounts for more than 85% of all personal computers).
Click this link to setup your automatic updates.
2. Use a standard user account
Use a standard user account to protect your computer from malware.
Administrative privileges are only required to change computer settings or install a new program.
Yet, most people use an administrator account for day-to-day operation, which makes their computer
more vulnerable.
Support for
Windows XP ends on
April 8, 2014. If
you're running this
version of Windows
after support ends,
you won't get
security updates for
Windows
3
A standard account will not allow anyone or malware to install software or change the security settings
on your computer. There is one downside however - you need to enter your administrative password
when making a legitimate change to your system. Microsoft’s Help and How-to site provides more
information about the benefits of using a standard user account (in Vista, Windows 7 and Windows 8).
Newer versions of Windows have a User Account Control (UAC) feature that gives you additional control
by seeking your permission whenever a program is about to make a change to your system. Set UAC to
get your express permission before each change to your system.
3. Always password protect your computer
Use a password to protect your computer and storage devices against
unauthorized access. Use a two-level authentication. Change your password once
or twice every year or if you believe it has been compromised.
It is commonplace to see computers with no passwords or poorly constructed
passwords, such as a person or company name. Research has shown that most
users use the same password for many different accounts (computer, client
access, Facebook, Twitter, etc.). A breach of one, breaches all.
Create a strong password by using a combination of numbers, letters and other
keyboard characters. Use one password to access your computer and a different
password to access your client program, preferable a password not used
elsewhere.
Many healthcare organizations encourage password sharing as a way to reduce
their IT licenses and costs. This is poor practice that negates accountability and
transparency. With each sharing, a password becomes more vulnerable. Each
healthcare employee should have his/her own secure and confidential login
credentials, for which he/she can be held accountable.
4. A good antivirus is not an option
A good antivirus program is mandatory to protect your computer against most
common malware threats such as viruses, worms, trojan horses, etc..
There are many antivirus programs available, ranging from free to costly.
Microsoft Essentials is free and provides real-time malware protection for your
Windows 7 and XP systems. Windows 8™ comes with Microsoft Defender to
protect you from malware. Both programs offer several options:
- Real-time scanning will scan all files for known viruses before it accesses
your computer. Keep this feature turned on.
- Update your virus program and scan regularly. In addition, perform a full
manual scan once a month, as viruses can sneak through your defenses.
This aim, after all, is one of their specialties.
Do remember that having the best antivirus software installed is not a panacea for keeping viruses out
of your computer. An antivirus can only be developed after a virus has been found. Thus, new viruses
can roam freely for some time. Be prudent!
We see passwords
written on stickers
at the front
counter!!
Set a quick scan for
every Sunday and a
full system scan
once every month.
In some clinics 5 or
more therapists
share the same
PMS password
Keep your password
secret; do not share
it with anyone,
especially
colleagues or
support personnel
4
5. Always use a good firewall
Like an antivirus program, a firewall is mandatory for anyone connecting to the internet or other
networks. Always keep your firewall turned on.
Your computer has several ports which allows it to access the internet or local network services. A
firewall closes unused ports and restricts use of others; it prevents unwanted communication with other
computers on the internet or network or access to your computer.
If you are using a web-based software, a firewall may interrupt your connection. Do check with your
software provider.
6. Protect your computer at all times
Protect your computer, desktop or laptop, from being stolen.
Failure to do so is not only costly but you stand to lose valuable data
and weeks, if not months, of work. As a custodian of medical
information, protection of your computer and data devices should be
the first security rule in your organization. When in public places
(airports, conferences, coffee shops), treat your computer like cash.
Protect it at all times.
7. Remove data from your old computer
Securely remove the data from hard drives and other storage devices you don’t use. This practice
reduces the exposure of your data.
How did you remove the information from your old system that you threw out or donated? You may be
surprised to know that a simple delete does not remove your data. Deleted data can be restored and
accessed again with dire consequences. Here is a link to a great article on safely removing data from
your hard drive.
8. Be cautious with internet downloads
Use a trusted source whenever you download information, files or programs from the internet.
Computer predators will exploit the weaknesses of browsers and place malware on your computer,
without your knowledge. Today’s sophisticated malware can be embedded in file or a document such as
a PDF file. These malware can damage your operating system, generate annoying pop-up ads, waste
your computer resources, track your internet usage and may even send personal information back to
the predator. If you are a regular web user, running an anti-spyware is an excellent option. Spybot
Search and Destroy is a free anti-spyware that does a great job.
9. Email can be dangerous
Email attachments remain the most favoured tool used to propagate malware. You may receive an
infected file or be invited to click on an email link that takes you to a site loaded with malware.
Follow these simple rules to avoid virus dissemination through emails.
At the University of
Toronto, six of us took a
lunch break leaving our
laptops in a room we
considered secure only to
return 50 minutes later
to find 3 laptops missing.
5
- Be wary of email attachments from companies or unknown persons. If you wish to open an email, a
safe approach is to right-click on the attachment, choose the download files option and scan the file
using your anti-virus program.
- Delete chain emails as fast as you can. Worms (similar to ILOVEYOU or
Melissa) use e-mail to carry their damaging payloads.
- Avoid clicking on links in an email from unfamiliar persons or sites. You can
also turn on the Plain Text setting in your email. This option blocks the
HTML beacons used by predators. However, this option may not be
practical, as an increasing number of legitimate companies use enriched
features of email as part of their marketing effort.
10. Secure your backups and flash drives
Secure your backup data at all times.
So you perform a daily backup of your data. But is your backup password
protected? Is it physically protected? Is it stored in the same location as your
original data? Is your backup data encrypted? These are great questions to ask.
Here are three simple rules to follow:
Backup rule 1: Keep your backup data password protected in a secure location
away from your business premises or home.
Backup rule 2: Stored data should be encrypted. Encryption is a great second
level protection that prevents unauthorized access to your data.
Backup rule 3: Remove all unused data on your storage device (if you don’t
need it, delete it).
11. Avoid public computers
Avoid using public computers to access your business network, PMS or CMS software.
A public computer (and these include computers in hotels, airports, conferences centres, etc.) can be
used by predators to collect confidential information. A key logger (a program that records all your key-
strokes) can be used to record your personal information. See Microsoft Safety Tips for using a public
computer. Entering sensitive information should be done from your own or a trusted computer. Even
checking email, which is done by more than 75% of people, is suspect.
12. Avoid public Wi-Fi connections
Think twice about using public Wi-Fi to connect to your network at the office or
elsewhere. A public Wi-Fi network is exactly what it says, public. With public
Wi-Fi, your privacy is akin to making a confidential phone call while surrounded
by strangers, except you don’t know who is eavesdropping. Since many people
share these networks, the risk of a hacker stealing your password or personal
data is very high. If you do use a public wireless network, use only encrypted
wireless networks and be sure to leave your firewall turned on. You should also
avoid sending passwords through Public networks.
A colleague did his
backup diligently
and locked it in a
safe in his office.
Despite his efforts,
he lost both his
original and
backup data to a
fire.
Do not login to your
neighbour’s free
internet connection.
It may have a raison
d'être. Free does
not mean absolutely
free!
A good rule: Avoid
downloading
emails from people
or companies you
don’t recognize.
6
Rogers provides a safe mobile internet connection for users on the go. Rocket Mobile Internet Stick
comes with monthly plans starting from $22. Also most mobile plan will allow you to setup and connect
to your own secure hotspot.
If you use a wireless connection, in the office or at home, encrypt it with a strong password.
In summary
Using a computer and the internet can be enormously rewarding and productive. At the same time, it
can be costly and dangerous. Take the time to learn the rules and practice them diligently. You would
not get a ticket for using an outdated antivirus or operating system, but worse you could lose your
clients’ data, and your job or business with it.
A few simple but important precautions with your computer and internet usage can prevent you from
becoming the next innocent victim. Be Prudent!
About the Author
Danny Doobay has been a Business and IT consultant to industry and government for more than 25
years. He has held executive positions in both public and private sectors. He has also project managed
software development, implementation and data migration.
He is currently the CEO of Baylaan Technologies, a software solutions developer based in Markham,
Ontario. Baylaan develops both custom and packaged software solutions for several sectors, including
Financial, Health, Educational and Government.
Danny Doobay, MBA, BA (Hons.)
Chief Executive Officer
Baylaan Technologies Inc.
66 Bullock Drive, Unit 3
Markham, Ontario L3P 3P2
Tel: 905-202-4716
Fax: 905-202-5263
Email: ddoobay@baylaan.com
http://www.baylaan.com/
Follow Danny on:

Mais conteúdo relacionado

Mais procurados

Cscu module 02 securing operating systems
Cscu module 02 securing operating systemsCscu module 02 securing operating systems
Cscu module 02 securing operating systemsSejahtera Affif
 
Module ict society
Module ict societyModule ict society
Module ict societyKak Yong
 
Computer viruses by joy chakraborty
Computer viruses by joy chakrabortyComputer viruses by joy chakraborty
Computer viruses by joy chakrabortyJoy Chakraborty
 
A Probabilistic Approach Using Poisson Process for Detecting the Existence of...
A Probabilistic Approach Using Poisson Process for Detecting the Existence of...A Probabilistic Approach Using Poisson Process for Detecting the Existence of...
A Probabilistic Approach Using Poisson Process for Detecting the Existence of...theijes
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesAlireza Ghahrood
 
Anti virus in the corporate arena
Anti virus in the corporate arenaAnti virus in the corporate arena
Anti virus in the corporate arenaUltraUploader
 
Introductions To Malwares
Introductions To MalwaresIntroductions To Malwares
Introductions To MalwaresCyber Vignan
 
Web Threat Spotlight Issue 66: Zero-Day Adobe Flash Player Exploits in a Flash
Web Threat Spotlight Issue 66:  Zero-Day Adobe Flash Player Exploits in a FlashWeb Threat Spotlight Issue 66:  Zero-Day Adobe Flash Player Exploits in a Flash
Web Threat Spotlight Issue 66: Zero-Day Adobe Flash Player Exploits in a FlashTrend Micro
 
Computer security and_privacy_tif_key
Computer security and_privacy_tif_keyComputer security and_privacy_tif_key
Computer security and_privacy_tif_keythinkict
 
Eileen Presentation
Eileen  PresentationEileen  Presentation
Eileen Presentationjc06442n
 
IRJET- Implementation of Anti-Drive
IRJET- Implementation of Anti-DriveIRJET- Implementation of Anti-Drive
IRJET- Implementation of Anti-DriveIRJET Journal
 

Mais procurados (17)

Cscu module 02 securing operating systems
Cscu module 02 securing operating systemsCscu module 02 securing operating systems
Cscu module 02 securing operating systems
 
Module ict society
Module ict societyModule ict society
Module ict society
 
SCGOV Report
SCGOV ReportSCGOV Report
SCGOV Report
 
Computer viruses by joy chakraborty
Computer viruses by joy chakrabortyComputer viruses by joy chakraborty
Computer viruses by joy chakraborty
 
Virus
VirusVirus
Virus
 
A Probabilistic Approach Using Poisson Process for Detecting the Existence of...
A Probabilistic Approach Using Poisson Process for Detecting the Existence of...A Probabilistic Approach Using Poisson Process for Detecting the Existence of...
A Probabilistic Approach Using Poisson Process for Detecting the Existence of...
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antiviruses
 
Computervirus
Computervirus Computervirus
Computervirus
 
Presentation
PresentationPresentation
Presentation
 
Anti virus in the corporate arena
Anti virus in the corporate arenaAnti virus in the corporate arena
Anti virus in the corporate arena
 
Virus presentation
Virus presentationVirus presentation
Virus presentation
 
Introductions To Malwares
Introductions To MalwaresIntroductions To Malwares
Introductions To Malwares
 
Web Threat Spotlight Issue 66: Zero-Day Adobe Flash Player Exploits in a Flash
Web Threat Spotlight Issue 66:  Zero-Day Adobe Flash Player Exploits in a FlashWeb Threat Spotlight Issue 66:  Zero-Day Adobe Flash Player Exploits in a Flash
Web Threat Spotlight Issue 66: Zero-Day Adobe Flash Player Exploits in a Flash
 
Computer security and_privacy_tif_key
Computer security and_privacy_tif_keyComputer security and_privacy_tif_key
Computer security and_privacy_tif_key
 
Eileen Presentation
Eileen  PresentationEileen  Presentation
Eileen Presentation
 
Information security policy
Information security policyInformation security policy
Information security policy
 
IRJET- Implementation of Anti-Drive
IRJET- Implementation of Anti-DriveIRJET- Implementation of Anti-Drive
IRJET- Implementation of Anti-Drive
 

Destaque

Electronic Health Information- Guide to Privacy & Security
Electronic Health Information- Guide to Privacy & SecurityElectronic Health Information- Guide to Privacy & Security
Electronic Health Information- Guide to Privacy & SecurityDr Dev Kambhampati
 
Need For Electronic Security:myths & beliefs in Indian society
Need For Electronic Security:myths & beliefs in Indian societyNeed For Electronic Security:myths & beliefs in Indian society
Need For Electronic Security:myths & beliefs in Indian societyrahul arora
 
49540326 electronic-eye
49540326 electronic-eye49540326 electronic-eye
49540326 electronic-eyePavan Kumar
 
Electronic security system
Electronic security systemElectronic security system
Electronic security systemAtharva Chavan
 
Presentation on Electronic Eye controlled Security System
Presentation on Electronic Eye controlled Security SystemPresentation on Electronic Eye controlled Security System
Presentation on Electronic Eye controlled Security SystemSagar Magarde
 

Destaque (8)

Security & Privacy for Health Data
Security & Privacy for Health DataSecurity & Privacy for Health Data
Security & Privacy for Health Data
 
Electronic Health Information- Guide to Privacy & Security
Electronic Health Information- Guide to Privacy & SecurityElectronic Health Information- Guide to Privacy & Security
Electronic Health Information- Guide to Privacy & Security
 
Need For Electronic Security:myths & beliefs in Indian society
Need For Electronic Security:myths & beliefs in Indian societyNeed For Electronic Security:myths & beliefs in Indian society
Need For Electronic Security:myths & beliefs in Indian society
 
49540326 electronic-eye
49540326 electronic-eye49540326 electronic-eye
49540326 electronic-eye
 
Ppt
PptPpt
Ppt
 
THE ELECTRONIC EYE
THE ELECTRONIC EYETHE ELECTRONIC EYE
THE ELECTRONIC EYE
 
Electronic security system
Electronic security systemElectronic security system
Electronic security system
 
Presentation on Electronic Eye controlled Security System
Presentation on Electronic Eye controlled Security SystemPresentation on Electronic Eye controlled Security System
Presentation on Electronic Eye controlled Security System
 

Semelhante a Information security for health practitioners

An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)Cyber Security Infotech
 
The 10 Commandments of Computer Security
The 10 Commandments of Computer SecurityThe 10 Commandments of Computer Security
The 10 Commandments of Computer SecurityTechvera
 
Cyber security and safety
Cyber security and safetyCyber security and safety
Cyber security and safetyDooremoore
 
Giarritano concept paper 4
Giarritano concept paper 4Giarritano concept paper 4
Giarritano concept paper 4leahg118
 
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A  ....Salwan public schoolDev Abhijet Gagan Chaitanya VII-A  ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public schoolDevku45
 
Tips to remove malwares
Tips to remove malwaresTips to remove malwares
Tips to remove malwaresanthnyq
 
Cybersafety basics
Cybersafety basicsCybersafety basics
Cybersafety basicsjeeva9948
 
How to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the CloudHow to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the CloudNordic Backup
 
10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.Khalil Jubran
 
Computer Security Guide to Pc Security
Computer Security Guide to Pc SecurityComputer Security Guide to Pc Security
Computer Security Guide to Pc SecurityMallTake
 
How to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, VirusHow to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, VirusHabFg
 
091005 Internet Security
091005 Internet Security091005 Internet Security
091005 Internet Securitydkp205
 
Internet security
Internet securityInternet security
Internet securityrfukunaga
 
8 threats that even antivirus cannot catch
8 threats that even antivirus cannot catch8 threats that even antivirus cannot catch
8 threats that even antivirus cannot catchiYogi
 

Semelhante a Information security for health practitioners (20)

An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)
 
LESSON 2.pptx
LESSON 2.pptxLESSON 2.pptx
LESSON 2.pptx
 
The 10 Commandments of Computer Security
The 10 Commandments of Computer SecurityThe 10 Commandments of Computer Security
The 10 Commandments of Computer Security
 
Cyber security and safety
Cyber security and safetyCyber security and safety
Cyber security and safety
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
Giarritano concept paper 4
Giarritano concept paper 4Giarritano concept paper 4
Giarritano concept paper 4
 
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A  ....Salwan public schoolDev Abhijet Gagan Chaitanya VII-A  ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public school
 
Tips to remove malwares
Tips to remove malwaresTips to remove malwares
Tips to remove malwares
 
Chapter 5.pptx
Chapter 5.pptxChapter 5.pptx
Chapter 5.pptx
 
Cybersafety basics
Cybersafety basicsCybersafety basics
Cybersafety basics
 
How to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the CloudHow to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the Cloud
 
10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.
 
Cyber-savvy Cyber-safety
Cyber-savvy Cyber-safety Cyber-savvy Cyber-safety
Cyber-savvy Cyber-safety
 
Computer Security Guide to Pc Security
Computer Security Guide to Pc SecurityComputer Security Guide to Pc Security
Computer Security Guide to Pc Security
 
How to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, VirusHow to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, Virus
 
091005 Internet Security
091005 Internet Security091005 Internet Security
091005 Internet Security
 
Internet security
Internet securityInternet security
Internet security
 
Cyber security
Cyber securityCyber security
Cyber security
 
8 threats that even antivirus cannot catch
8 threats that even antivirus cannot catch8 threats that even antivirus cannot catch
8 threats that even antivirus cannot catch
 
Guide to pc_security
Guide to pc_securityGuide to pc_security
Guide to pc_security
 

Último

Best Rate (Patna ) Call Girls Patna ⟟ 8617370543 ⟟ High Class Call Girl In 5 ...
Best Rate (Patna ) Call Girls Patna ⟟ 8617370543 ⟟ High Class Call Girl In 5 ...Best Rate (Patna ) Call Girls Patna ⟟ 8617370543 ⟟ High Class Call Girl In 5 ...
Best Rate (Patna ) Call Girls Patna ⟟ 8617370543 ⟟ High Class Call Girl In 5 ...Dipal Arora
 
The Most Attractive Hyderabad Call Girls Kothapet 𖠋 6297143586 𖠋 Will You Mis...
The Most Attractive Hyderabad Call Girls Kothapet 𖠋 6297143586 𖠋 Will You Mis...The Most Attractive Hyderabad Call Girls Kothapet 𖠋 6297143586 𖠋 Will You Mis...
The Most Attractive Hyderabad Call Girls Kothapet 𖠋 6297143586 𖠋 Will You Mis...chandars293
 
VIP Call Girls Indore Kirti 💚😋 9256729539 🚀 Indore Escorts
VIP Call Girls Indore Kirti 💚😋  9256729539 🚀 Indore EscortsVIP Call Girls Indore Kirti 💚😋  9256729539 🚀 Indore Escorts
VIP Call Girls Indore Kirti 💚😋 9256729539 🚀 Indore Escortsaditipandeya
 
Call Girls Coimbatore Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Coimbatore Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Coimbatore Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Coimbatore Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Call Girls Cuttack Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Cuttack Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Cuttack Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Cuttack Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Premium Call Girls Cottonpet Whatsapp 7001035870 Independent Escort Service
Premium Call Girls Cottonpet Whatsapp 7001035870 Independent Escort ServicePremium Call Girls Cottonpet Whatsapp 7001035870 Independent Escort Service
Premium Call Girls Cottonpet Whatsapp 7001035870 Independent Escort Servicevidya singh
 
VIP Service Call Girls Sindhi Colony 📳 7877925207 For 18+ VIP Call Girl At Th...
VIP Service Call Girls Sindhi Colony 📳 7877925207 For 18+ VIP Call Girl At Th...VIP Service Call Girls Sindhi Colony 📳 7877925207 For 18+ VIP Call Girl At Th...
VIP Service Call Girls Sindhi Colony 📳 7877925207 For 18+ VIP Call Girl At Th...jageshsingh5554
 
Call Girls Nagpur Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Nagpur Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Nagpur Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Nagpur Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Call Girls Tirupati Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Tirupati Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Tirupati Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Tirupati Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Night 7k to 12k Chennai City Center Call Girls 👉👉 7427069034⭐⭐ 100% Genuine E...
Night 7k to 12k Chennai City Center Call Girls 👉👉 7427069034⭐⭐ 100% Genuine E...Night 7k to 12k Chennai City Center Call Girls 👉👉 7427069034⭐⭐ 100% Genuine E...
Night 7k to 12k Chennai City Center Call Girls 👉👉 7427069034⭐⭐ 100% Genuine E...hotbabesbook
 
(Rocky) Jaipur Call Girl - 09521753030 Escorts Service 50% Off with Cash ON D...
(Rocky) Jaipur Call Girl - 09521753030 Escorts Service 50% Off with Cash ON D...(Rocky) Jaipur Call Girl - 09521753030 Escorts Service 50% Off with Cash ON D...
(Rocky) Jaipur Call Girl - 09521753030 Escorts Service 50% Off with Cash ON D...indiancallgirl4rent
 
Night 7k to 12k Navi Mumbai Call Girl Photo 👉 BOOK NOW 9833363713 👈 ♀️ night ...
Night 7k to 12k Navi Mumbai Call Girl Photo 👉 BOOK NOW 9833363713 👈 ♀️ night ...Night 7k to 12k Navi Mumbai Call Girl Photo 👉 BOOK NOW 9833363713 👈 ♀️ night ...
Night 7k to 12k Navi Mumbai Call Girl Photo 👉 BOOK NOW 9833363713 👈 ♀️ night ...aartirawatdelhi
 
Call Girls Haridwar Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Haridwar Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Haridwar Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Haridwar Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
VIP Hyderabad Call Girls Bahadurpally 7877925207 ₹5000 To 25K With AC Room 💚😋
VIP Hyderabad Call Girls Bahadurpally 7877925207 ₹5000 To 25K With AC Room 💚😋VIP Hyderabad Call Girls Bahadurpally 7877925207 ₹5000 To 25K With AC Room 💚😋
VIP Hyderabad Call Girls Bahadurpally 7877925207 ₹5000 To 25K With AC Room 💚😋TANUJA PANDEY
 
Lucknow Call girls - 8800925952 - 24x7 service with hotel room
Lucknow Call girls - 8800925952 - 24x7 service with hotel roomLucknow Call girls - 8800925952 - 24x7 service with hotel room
Lucknow Call girls - 8800925952 - 24x7 service with hotel roomdiscovermytutordmt
 
Pondicherry Call Girls Book Now 9630942363 Top Class Pondicherry Escort Servi...
Pondicherry Call Girls Book Now 9630942363 Top Class Pondicherry Escort Servi...Pondicherry Call Girls Book Now 9630942363 Top Class Pondicherry Escort Servi...
Pondicherry Call Girls Book Now 9630942363 Top Class Pondicherry Escort Servi...Genuine Call Girls
 
Call Girls Bhubaneswar Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Bhubaneswar Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Bhubaneswar Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Bhubaneswar Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
Call Girls Gwalior Just Call 8617370543 Top Class Call Girl Service Available
Call Girls Gwalior Just Call 8617370543 Top Class Call Girl Service AvailableCall Girls Gwalior Just Call 8617370543 Top Class Call Girl Service Available
Call Girls Gwalior Just Call 8617370543 Top Class Call Girl Service AvailableDipal Arora
 
Top Quality Call Girl Service Kalyanpur 6378878445 Available Call Girls Any Time
Top Quality Call Girl Service Kalyanpur 6378878445 Available Call Girls Any TimeTop Quality Call Girl Service Kalyanpur 6378878445 Available Call Girls Any Time
Top Quality Call Girl Service Kalyanpur 6378878445 Available Call Girls Any TimeCall Girls Delhi
 
Call Girls Kochi Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Kochi Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Kochi Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Kochi Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 

Último (20)

Best Rate (Patna ) Call Girls Patna ⟟ 8617370543 ⟟ High Class Call Girl In 5 ...
Best Rate (Patna ) Call Girls Patna ⟟ 8617370543 ⟟ High Class Call Girl In 5 ...Best Rate (Patna ) Call Girls Patna ⟟ 8617370543 ⟟ High Class Call Girl In 5 ...
Best Rate (Patna ) Call Girls Patna ⟟ 8617370543 ⟟ High Class Call Girl In 5 ...
 
The Most Attractive Hyderabad Call Girls Kothapet 𖠋 6297143586 𖠋 Will You Mis...
The Most Attractive Hyderabad Call Girls Kothapet 𖠋 6297143586 𖠋 Will You Mis...The Most Attractive Hyderabad Call Girls Kothapet 𖠋 6297143586 𖠋 Will You Mis...
The Most Attractive Hyderabad Call Girls Kothapet 𖠋 6297143586 𖠋 Will You Mis...
 
VIP Call Girls Indore Kirti 💚😋 9256729539 🚀 Indore Escorts
VIP Call Girls Indore Kirti 💚😋  9256729539 🚀 Indore EscortsVIP Call Girls Indore Kirti 💚😋  9256729539 🚀 Indore Escorts
VIP Call Girls Indore Kirti 💚😋 9256729539 🚀 Indore Escorts
 
Call Girls Coimbatore Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Coimbatore Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Coimbatore Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Coimbatore Just Call 9907093804 Top Class Call Girl Service Available
 
Call Girls Cuttack Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Cuttack Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Cuttack Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Cuttack Just Call 9907093804 Top Class Call Girl Service Available
 
Premium Call Girls Cottonpet Whatsapp 7001035870 Independent Escort Service
Premium Call Girls Cottonpet Whatsapp 7001035870 Independent Escort ServicePremium Call Girls Cottonpet Whatsapp 7001035870 Independent Escort Service
Premium Call Girls Cottonpet Whatsapp 7001035870 Independent Escort Service
 
VIP Service Call Girls Sindhi Colony 📳 7877925207 For 18+ VIP Call Girl At Th...
VIP Service Call Girls Sindhi Colony 📳 7877925207 For 18+ VIP Call Girl At Th...VIP Service Call Girls Sindhi Colony 📳 7877925207 For 18+ VIP Call Girl At Th...
VIP Service Call Girls Sindhi Colony 📳 7877925207 For 18+ VIP Call Girl At Th...
 
Call Girls Nagpur Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Nagpur Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Nagpur Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Nagpur Just Call 9907093804 Top Class Call Girl Service Available
 
Call Girls Tirupati Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Tirupati Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Tirupati Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Tirupati Just Call 9907093804 Top Class Call Girl Service Available
 
Night 7k to 12k Chennai City Center Call Girls 👉👉 7427069034⭐⭐ 100% Genuine E...
Night 7k to 12k Chennai City Center Call Girls 👉👉 7427069034⭐⭐ 100% Genuine E...Night 7k to 12k Chennai City Center Call Girls 👉👉 7427069034⭐⭐ 100% Genuine E...
Night 7k to 12k Chennai City Center Call Girls 👉👉 7427069034⭐⭐ 100% Genuine E...
 
(Rocky) Jaipur Call Girl - 09521753030 Escorts Service 50% Off with Cash ON D...
(Rocky) Jaipur Call Girl - 09521753030 Escorts Service 50% Off with Cash ON D...(Rocky) Jaipur Call Girl - 09521753030 Escorts Service 50% Off with Cash ON D...
(Rocky) Jaipur Call Girl - 09521753030 Escorts Service 50% Off with Cash ON D...
 
Night 7k to 12k Navi Mumbai Call Girl Photo 👉 BOOK NOW 9833363713 👈 ♀️ night ...
Night 7k to 12k Navi Mumbai Call Girl Photo 👉 BOOK NOW 9833363713 👈 ♀️ night ...Night 7k to 12k Navi Mumbai Call Girl Photo 👉 BOOK NOW 9833363713 👈 ♀️ night ...
Night 7k to 12k Navi Mumbai Call Girl Photo 👉 BOOK NOW 9833363713 👈 ♀️ night ...
 
Call Girls Haridwar Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Haridwar Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Haridwar Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Haridwar Just Call 9907093804 Top Class Call Girl Service Available
 
VIP Hyderabad Call Girls Bahadurpally 7877925207 ₹5000 To 25K With AC Room 💚😋
VIP Hyderabad Call Girls Bahadurpally 7877925207 ₹5000 To 25K With AC Room 💚😋VIP Hyderabad Call Girls Bahadurpally 7877925207 ₹5000 To 25K With AC Room 💚😋
VIP Hyderabad Call Girls Bahadurpally 7877925207 ₹5000 To 25K With AC Room 💚😋
 
Lucknow Call girls - 8800925952 - 24x7 service with hotel room
Lucknow Call girls - 8800925952 - 24x7 service with hotel roomLucknow Call girls - 8800925952 - 24x7 service with hotel room
Lucknow Call girls - 8800925952 - 24x7 service with hotel room
 
Pondicherry Call Girls Book Now 9630942363 Top Class Pondicherry Escort Servi...
Pondicherry Call Girls Book Now 9630942363 Top Class Pondicherry Escort Servi...Pondicherry Call Girls Book Now 9630942363 Top Class Pondicherry Escort Servi...
Pondicherry Call Girls Book Now 9630942363 Top Class Pondicherry Escort Servi...
 
Call Girls Bhubaneswar Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Bhubaneswar Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Bhubaneswar Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Bhubaneswar Just Call 9907093804 Top Class Call Girl Service Avail...
 
Call Girls Gwalior Just Call 8617370543 Top Class Call Girl Service Available
Call Girls Gwalior Just Call 8617370543 Top Class Call Girl Service AvailableCall Girls Gwalior Just Call 8617370543 Top Class Call Girl Service Available
Call Girls Gwalior Just Call 8617370543 Top Class Call Girl Service Available
 
Top Quality Call Girl Service Kalyanpur 6378878445 Available Call Girls Any Time
Top Quality Call Girl Service Kalyanpur 6378878445 Available Call Girls Any TimeTop Quality Call Girl Service Kalyanpur 6378878445 Available Call Girls Any Time
Top Quality Call Girl Service Kalyanpur 6378878445 Available Call Girls Any Time
 
Call Girls Kochi Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Kochi Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Kochi Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Kochi Just Call 9907093804 Top Class Call Girl Service Available
 

Information security for health practitioners

  • 1. Information Security for Health Practitioners 12 ways to protect your clients’ information and yourself A clinic can be fined up to $250,000 for each breach of privacy. Every employee of the business can be fined up to $50,000 by the Privacy Commissioner. Patient receives $10,000 for mental anguish and also is able to initiate a civil lawsuit against the business and its employees-CHIPRB
  • 2. 2 Information security is one of the biggest challenges facing healthcare companies and practitioners. With the ubiquity of technology, today’s healthcare practitioner uses at least one computer device (PDA, mobile phone, laptop, notebook or netbook) in his/her daily routine. Most work with several devices and programs, transferring information from one program to another, often with questionable security provisions. But alongside the solid productivity gains spawned by technology, are cyber predators who actively engaged in stealing valuable information, using malware (including various forms of viruses, worms, trojans) as the tool of choice. The consequences of becoming a victim can be devastating. In addition to hefty fines mandated by PHIPA, a publicized breach of information can have severe costs for employees, employers and consultants. Don’t become the next victim. Prevention is the best practice, especially in small to mid-size companies without dedicated technology and security support. Healthcare companies and practitioners would be prudent to consider a review of their information security systems. Here are two inexpensive suggestions you can start with: I. Invest in a secure Case and Practice Management Software, with built-in encryption technology. II. Implement a good security policy or security routine. Here are a few good policies and practices you can start with immediately. 1. Use a current operating system Keep your computer operating system up-to-date. First, your operating system should be one that is currently supported by the software vendor. Windows 2000 software may be very good but is long discontinued by Microsoft. Current Microsoft operating systems include XP, Vista, Windows 7 and Windows 8. Microsoft will no longer support its XP operating system after April 8, 2014. You should plan to replace your XP operating systems with Windows 7 or 8. Second, keep your computer operating system up-to-date. Free updates released by software vendors, close security loopholes, and keep you abreast with technology, among other things. There is an automatic update setting that, if turned on, allows your computer to download and update all critical updates from Microsoft (which accounts for more than 85% of all personal computers). Click this link to setup your automatic updates. 2. Use a standard user account Use a standard user account to protect your computer from malware. Administrative privileges are only required to change computer settings or install a new program. Yet, most people use an administrator account for day-to-day operation, which makes their computer more vulnerable. Support for Windows XP ends on April 8, 2014. If you're running this version of Windows after support ends, you won't get security updates for Windows
  • 3. 3 A standard account will not allow anyone or malware to install software or change the security settings on your computer. There is one downside however - you need to enter your administrative password when making a legitimate change to your system. Microsoft’s Help and How-to site provides more information about the benefits of using a standard user account (in Vista, Windows 7 and Windows 8). Newer versions of Windows have a User Account Control (UAC) feature that gives you additional control by seeking your permission whenever a program is about to make a change to your system. Set UAC to get your express permission before each change to your system. 3. Always password protect your computer Use a password to protect your computer and storage devices against unauthorized access. Use a two-level authentication. Change your password once or twice every year or if you believe it has been compromised. It is commonplace to see computers with no passwords or poorly constructed passwords, such as a person or company name. Research has shown that most users use the same password for many different accounts (computer, client access, Facebook, Twitter, etc.). A breach of one, breaches all. Create a strong password by using a combination of numbers, letters and other keyboard characters. Use one password to access your computer and a different password to access your client program, preferable a password not used elsewhere. Many healthcare organizations encourage password sharing as a way to reduce their IT licenses and costs. This is poor practice that negates accountability and transparency. With each sharing, a password becomes more vulnerable. Each healthcare employee should have his/her own secure and confidential login credentials, for which he/she can be held accountable. 4. A good antivirus is not an option A good antivirus program is mandatory to protect your computer against most common malware threats such as viruses, worms, trojan horses, etc.. There are many antivirus programs available, ranging from free to costly. Microsoft Essentials is free and provides real-time malware protection for your Windows 7 and XP systems. Windows 8™ comes with Microsoft Defender to protect you from malware. Both programs offer several options: - Real-time scanning will scan all files for known viruses before it accesses your computer. Keep this feature turned on. - Update your virus program and scan regularly. In addition, perform a full manual scan once a month, as viruses can sneak through your defenses. This aim, after all, is one of their specialties. Do remember that having the best antivirus software installed is not a panacea for keeping viruses out of your computer. An antivirus can only be developed after a virus has been found. Thus, new viruses can roam freely for some time. Be prudent! We see passwords written on stickers at the front counter!! Set a quick scan for every Sunday and a full system scan once every month. In some clinics 5 or more therapists share the same PMS password Keep your password secret; do not share it with anyone, especially colleagues or support personnel
  • 4. 4 5. Always use a good firewall Like an antivirus program, a firewall is mandatory for anyone connecting to the internet or other networks. Always keep your firewall turned on. Your computer has several ports which allows it to access the internet or local network services. A firewall closes unused ports and restricts use of others; it prevents unwanted communication with other computers on the internet or network or access to your computer. If you are using a web-based software, a firewall may interrupt your connection. Do check with your software provider. 6. Protect your computer at all times Protect your computer, desktop or laptop, from being stolen. Failure to do so is not only costly but you stand to lose valuable data and weeks, if not months, of work. As a custodian of medical information, protection of your computer and data devices should be the first security rule in your organization. When in public places (airports, conferences, coffee shops), treat your computer like cash. Protect it at all times. 7. Remove data from your old computer Securely remove the data from hard drives and other storage devices you don’t use. This practice reduces the exposure of your data. How did you remove the information from your old system that you threw out or donated? You may be surprised to know that a simple delete does not remove your data. Deleted data can be restored and accessed again with dire consequences. Here is a link to a great article on safely removing data from your hard drive. 8. Be cautious with internet downloads Use a trusted source whenever you download information, files or programs from the internet. Computer predators will exploit the weaknesses of browsers and place malware on your computer, without your knowledge. Today’s sophisticated malware can be embedded in file or a document such as a PDF file. These malware can damage your operating system, generate annoying pop-up ads, waste your computer resources, track your internet usage and may even send personal information back to the predator. If you are a regular web user, running an anti-spyware is an excellent option. Spybot Search and Destroy is a free anti-spyware that does a great job. 9. Email can be dangerous Email attachments remain the most favoured tool used to propagate malware. You may receive an infected file or be invited to click on an email link that takes you to a site loaded with malware. Follow these simple rules to avoid virus dissemination through emails. At the University of Toronto, six of us took a lunch break leaving our laptops in a room we considered secure only to return 50 minutes later to find 3 laptops missing.
  • 5. 5 - Be wary of email attachments from companies or unknown persons. If you wish to open an email, a safe approach is to right-click on the attachment, choose the download files option and scan the file using your anti-virus program. - Delete chain emails as fast as you can. Worms (similar to ILOVEYOU or Melissa) use e-mail to carry their damaging payloads. - Avoid clicking on links in an email from unfamiliar persons or sites. You can also turn on the Plain Text setting in your email. This option blocks the HTML beacons used by predators. However, this option may not be practical, as an increasing number of legitimate companies use enriched features of email as part of their marketing effort. 10. Secure your backups and flash drives Secure your backup data at all times. So you perform a daily backup of your data. But is your backup password protected? Is it physically protected? Is it stored in the same location as your original data? Is your backup data encrypted? These are great questions to ask. Here are three simple rules to follow: Backup rule 1: Keep your backup data password protected in a secure location away from your business premises or home. Backup rule 2: Stored data should be encrypted. Encryption is a great second level protection that prevents unauthorized access to your data. Backup rule 3: Remove all unused data on your storage device (if you don’t need it, delete it). 11. Avoid public computers Avoid using public computers to access your business network, PMS or CMS software. A public computer (and these include computers in hotels, airports, conferences centres, etc.) can be used by predators to collect confidential information. A key logger (a program that records all your key- strokes) can be used to record your personal information. See Microsoft Safety Tips for using a public computer. Entering sensitive information should be done from your own or a trusted computer. Even checking email, which is done by more than 75% of people, is suspect. 12. Avoid public Wi-Fi connections Think twice about using public Wi-Fi to connect to your network at the office or elsewhere. A public Wi-Fi network is exactly what it says, public. With public Wi-Fi, your privacy is akin to making a confidential phone call while surrounded by strangers, except you don’t know who is eavesdropping. Since many people share these networks, the risk of a hacker stealing your password or personal data is very high. If you do use a public wireless network, use only encrypted wireless networks and be sure to leave your firewall turned on. You should also avoid sending passwords through Public networks. A colleague did his backup diligently and locked it in a safe in his office. Despite his efforts, he lost both his original and backup data to a fire. Do not login to your neighbour’s free internet connection. It may have a raison d'être. Free does not mean absolutely free! A good rule: Avoid downloading emails from people or companies you don’t recognize.
  • 6. 6 Rogers provides a safe mobile internet connection for users on the go. Rocket Mobile Internet Stick comes with monthly plans starting from $22. Also most mobile plan will allow you to setup and connect to your own secure hotspot. If you use a wireless connection, in the office or at home, encrypt it with a strong password. In summary Using a computer and the internet can be enormously rewarding and productive. At the same time, it can be costly and dangerous. Take the time to learn the rules and practice them diligently. You would not get a ticket for using an outdated antivirus or operating system, but worse you could lose your clients’ data, and your job or business with it. A few simple but important precautions with your computer and internet usage can prevent you from becoming the next innocent victim. Be Prudent! About the Author Danny Doobay has been a Business and IT consultant to industry and government for more than 25 years. He has held executive positions in both public and private sectors. He has also project managed software development, implementation and data migration. He is currently the CEO of Baylaan Technologies, a software solutions developer based in Markham, Ontario. Baylaan develops both custom and packaged software solutions for several sectors, including Financial, Health, Educational and Government. Danny Doobay, MBA, BA (Hons.) Chief Executive Officer Baylaan Technologies Inc. 66 Bullock Drive, Unit 3 Markham, Ontario L3P 3P2 Tel: 905-202-4716 Fax: 905-202-5263 Email: ddoobay@baylaan.com http://www.baylaan.com/ Follow Danny on: